Search Results - (((((((ant OR wyatt) OR semantic) OR when) OR cantor) OR anne) OR shape) OR hints) algorithms.

  1. 481

    Bayesian Analysis with Python. by Osvaldo Martin

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  2. 482

    Machine learning for protein subcellular localization prediction by Wan, Shibiao, Mak, M. W.

    Published 2015
    Table of Contents: “…5.2.2 Problem transformation methods -- 5.2.3 Multi-label classification in bioinformatics -- 5.3 mGOASVM: A predictor for both single- and multi-location proteins -- 5.3.1 Feature extraction -- 5.3.2 Multi-label multiclass SVM classification -- 5.4 AD-SVM: An adaptive decision multi-label predictor -- 5.4.1 Multi-label SVM scoring -- 5.4.2 Adaptive decision for SVM (AD-SVM) -- 5.4.3 Analysis of AD-SVM -- 5.5 mPLR-Loc: A multi-label predictor based on penalized logistic regression -- 5.5.1 Single-label penalized logistic regression -- 5.5.2 Multi-label penalized logistic regression -- 5.5.3 Adaptive decision for LR (mPLR-Loc) -- 5.6 Summary -- 6 Mining deeper on GO for protein subcellular localization -- 6.1 Related work -- 6.2 SS-Loc: Using semantic similarity over GO -- 6.2.1 Semantic similarity measures -- 6.2.2 SS vector construction -- 6.3 HybridGO-Loc: Hybridizing GO frequency and semantic similarity features -- 6.3.1 Hybridization of two GO features -- 6.3.2 Multi-label multiclass SVM classification -- 6.4 Summary -- 7 Ensemble random projection for large-scale predictions -- 7.1 Random projection -- 7.2 RP-SVM: A multi-label classifier with ensemble random projection -- 7.2.1 Ensemble multi-label classifier -- 7.2.2 Multi-label classification -- 7.3 R3P-Loc: A compact predictor based on ridge regression and ensemble random projection -- 7.3.1 Limitation of using current databases -- 7.3.2 Creating compact databases -- 7.3.3 Single-label ridge regression -- 7.3.4 Multi-label ridge regression -- 7.4 Summary -- 8 Experimental setup -- 8.1 Prediction of single-label proteins -- 8.1.1 Datasets construction -- 8.1.2 Performance metrics -- 8.2 Prediction of multi-label proteins -- 8.2.1 Dataset construction -- 8.2.2 Datasets analysis -- 8.2.3 Performance metrics -- 8.3 Statistical evaluation methods -- 8.4 Summary.…”
    Full text (MFA users only)
    Electronic eBook
  3. 483

    Eat, cook, grow : mixing human-computer interactions with human-food interactions

    Published 2014
    Table of Contents: “…"You don't have to be a gardener to do urban agriculture": understanding opportunities for designing interactive technologies to support urban food production / William Odom -- Augmented agriculture, algorithms, aerospace, and alimentary architectures / Jordan Geiger -- The allure of provenance: tracing food through user-generated production information / Ann Light -- Beyond gardening: a new approach to HCI and urban agriculture / Tad Hirsch -- Hungry for data: metabolic interaction from farm to fork to phenotype / Marc Tuters and Denisa Kera -- Food futures: three provocations to challenge HCI interventions / Greg Hearn and David Lindsay Wright -- Bringing technology to the dining table / Charles Spence -- List of recipes.…”
    Full text (MFA users only)
    Electronic eBook
  4. 484

    Medical and Care Compunetics 2 : Medical and Care Compunetics 2. by Bos, L.

    Published 2005
    Table of Contents: “…Standardized Semantic Markup for Reference Terminologies, Thesauri and Coding Systems: Benefits for Distributed E-Health ApplicationsDevelopment of an Expert System for Classification of Medical Errors; Model of Good Practice Tools for Risk Reduction and Clinical Governance; Optimisation Issues of High Throughput Medical Data and Video Streaming Traffic in 3G Wireless Environments; A New Algorithm for Content-Based Region Query in Databases with Medical Images; Economic Impact of Telemedicine: A Survey.…”
    Full text (MFA users only)
    Electronic eBook
  5. 485

    FRBR, before and after : a look at our bibliographic models by Coyle, Karen

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  6. 486

    Automatic indexing and abstracting of document texts by Moens, Marie-Francine, 1957-

    Published 2000
    Full text (MFA users only)
    Electronic eBook
  7. 487

    The Johns Hopkins guide to digital media

    Published 2014
    Table of Contents: “…Berry -- Cognitive implications of new media / Anne Mangen and Jean-Luc Velay -- Collaborative narrative / Scott Rettberg -- Collective intelligence / John Duda -- Combinatory and automatic text generation / Philippe Bootz and Christopher Funkhouser -- Computational linguistics / Inderjeet Mani -- Conceptual writing / Darren Wershler -- Copyright / Benjamin J. …”
    Book
  8. 488

    Hack proofing your network

    Published 2002
    Table of Contents: “…</br><br> Looking to the Source Code</br><br> Exploring Diff Tools</br><br> Using File-Comparison Tools</br><br> Working with Hex Editors</br><br> Utilizing File System Monitoring Tools</br><br> Finding Other Tools</br><br> Troubleshooting</br><br> Problems with Checksums and Hashes</br><br> Problems with Compression and Encryption</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 6 Cryptography</br><br> Introduction</br><br> Understanding Cryptography Concepts</br><br> History</br><br> Encryption Key Types</br><br> Learning about Standard Cryptographic Algorithms</br><br> Understanding Symmetric Algorithms</br><br> Understanding Asymmetric Algorithms</br><br> Understanding Brute Force</br><br> Brute Force Basics</br><br> Using Brute Force to Obtain Passwords</br><br> Knowing When Real Algorithms Are Being Used Improperly</br><br> Bad Key Exchanges</br><br> Hashing Pieces Separately</br><br> Using a Short Password to Generate a Long Key</br><br> Improperly Stored Private or Secret Keys</br><br> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers</br><br> Other Ways to Hide Information</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 7 Unexpected Input</br><br> Introduction</br><br> Understanding Why Unexpected Data Is Dangerous</br><br> Finding Situations Involving Unexpected Data</br><br> Local Applications and Utilities</br><br> HTTP/HTML</br><br> Unexpected Data in SQL Queries</br><br> Application Authentication</br><br> Disguising the Obvious</br><br> Using Techniques to Find and Eliminate Vulnerabilities</br><br> Black-Box Testing</br><br> Use the Source</br><br> Untaint Data by Filtering It</br><br> Escaping Characters Is Not Always Enough</br><br> Perl</br><br> Cold Fusion/Cold Fusion Markup Language (CFML)</br><br> ASP</br><br> PHP</br><br> Protecting Your SQL Queries</br><br> Silently Removing versus Alerting on Bad Data</br><br> Invalid Input Function</br><br> Token Substitution</br><br> Utilizing the Available Safety Features in Your Programming Language</br><br> Perl</br><br> PHP</br><br> ColdFusion/ColdFusion Markup Language</br><br> ASP</br><br> MySQL</br><br> Using Tools to Handle Unexpected Data</br><br> Web Sleuth</br><br> CGIAudit</br><br> RATS</br><br> Flawfinder</br><br> Retina</br><br> Hailstorm</br><br> Pudding</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 8 Buffer Overflow</br><br> Introduction</br><br> Understanding the Stack</br><br> The Stack Dump</br><br> Oddities and the Stack</br><br> Understanding the Stack Frame</br><br> Introduction to the Stack Frame</br><br> Passing Arguments to a Function: A Sample Program</br><br> Stack Frames and Calling Syntaxes</br><br> Learning about Buffer Overflows</br><br> A Simple Uncontrolled Overflow: A Sample Program</br><br> Creating Your First Overflow</br><br> Creating a Program with an Exploitable Overflow</br><br> Performing the Exploit</br><br> Learning Advanced Overflow Techniques </br><br> Stack Based Function Pointer Overwrite</br><br> Heap Overflows</br><br> Advanced Payload Design</br><br> Using What You Already Have</br><br> Summary</br><br> Solutions Fast Track</br><br> Frequently Asked Questions</br><br>Chapter 9 Format Strings</br><br> Introduction</br><br> Understanding Format String Vulnerabilities</br><br> Why and Where Do Format String Vulnerabilities Exist?…”
    Full text (MFA users only)
    Electronic eBook
  9. 489

    Fast finance : does the financial world allow social loafing? by Williams, Gervais

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  10. 490
  11. 491

    Mechanical and electrical technology VI : selected, peer reviewed papers from the 2014 6 th International Conference on Mechanical and Electrical Technology (ICMET 2014), July 17-1...

    Published 2014
    Table of Contents: “…Mechanical and Electrical Technology VI; Preface, Committees and Sponsors; Table of Contents; Chapter 1: Thermal and Mechanical Research, General Mechanical Engineering; Prediction the Springback in Air-Bending Process Using Neural Network Metamodel; Dynamic Equilibrium Configurations of Multibody Systems; Wear Behaviour of Stellite 6 Coatings Produced on an Austenitic Stainless Steel Substrate by Laser Cladding Using Two Different Heat Inputs; Influence of Pipe Diameters on Shapes of Air Taylor Bubbles in Small Pipes Containing Stagnant Water…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  12. 492

    Fundamentals of patenting and licensing for scientists and engineers by Ma, Matthew Y.

    Published 2009
    Table of Contents: “…When final rejection is received. 8.9. Appeal. 8.10. …”
    Full text (MFA users only)
    Electronic eBook
  13. 493

    Understanding large temporal networks and spatial networks : exploration, pattern searching, visualization and network evolution by Batagelj, Vladimir, 1948-

    Published 2014
    Table of Contents: “…Spanish Algorithms -- 3.8.4.A Sparse Network Algorithm -- 3.9. …”
    Full text (MFA users only)
    Electronic eBook
  14. 494

    Advanced design and manufacturing technology I

    Published 2011
    Table of Contents: “…Preface -- Technology and Characteristic of Wool Ring Spun Compound Yarn -- A Co-Evolutionary Contract Net-Based Framework for Distributed Manufacturing Execution Systems -- The Research on Cutting Force in High-Speed Milling Process of Aluminum Alloy Impeller -- Research of Asynchronous Multi-Type Sensors Data Fusion -- Researcher of Region Growing Medical Image Segmentation Based on Adaboost Algorithm -- Trail Investigation on Chip of High-Speed and Dry Cutting on Hardened Steel with PCBN Tool -- Simulate Measure for Spring Back of Autobody Panel's Edge -- Reconfigurable Clamping Device Based on Memory Alloy, Orientation Disc, Majority Column and Telescopic Pole -- Analysis of Mechanical Characteristics and Structural Options of Micro-Milling Cutter -- Study on Predictive Control of Ship Steering Gear System -- Research of Hydroforming Technology for Special-Shaped Cross-Section Pipe -- Design of CNC Grinding Machine Especially for C.V Joint Inner Race Spherical Raceway Processing -- Passivation of the Fe-Based Bulk Amorphous Alloy in HCl Solution -- Simulation of Temperature Field during 7022 Al Alloy Friction Stir Welding process Based on Dual-Source -- Study on Al-4.5Cu-3Ce Alloy Semi-Solid Slurry Prepared by Slope Vibration Casting -- Precision Control Research on DACS-Based Modern Digital Shipbuilding Technology -- Contact Stress Analysis of NCD Coating on Roll Ball of Ball Bearing -- Low Cycling Thermal Fatigue of Large-Scale Marine Diesel Engine Piston -- Study on Remote Monitoring and Control System for Construction Vehicle -- Research on New Structural Quay Container Crane -- Study on the Microstructure and Properties of Suspensory Wire in DVD CD-ROM Head -- Investigation of the Precipitation in Mg-Zr Alloys -- The Optimization of Cutting Parameter of Machining the Small Diameter Deep Hole on Austenitic Stainless Steel -- An Analysis of Drawing Process in Stamping Die Design for the Wheel Hub -- Effects of Residual Stress on Interfacial Bonding Strength of Zinc-Plated Film -- Friction and Wear of Polished Single Crystal Silicon at Different Area -- Numerical Simulation of the Machining Distortion of Aircraft Aluminum Part Caused by Redistribution of Residual Stress -- Study on Fuzzy D-S Evidence Theory Mathematics Foundation Based on the Form Prototype -- Study on the Influence of Internal Flow Field in Pipeline Elbow by the Guide Plate -- Research on Electrical Resistively of Wood Dust -- Primary Research of Bionic Design on Tools with Mouthpart of Larvae Long Horned Beetles -- Adsorption Analysis of Cr(VI) by Fly Ash Composite Material in Aqueous Medium -- Research of Controlling Heat Treatment Deformation for Powder Metallurgy Mechanical Structural Parts -- Influence of Vacuum Heat Treatment on Sintered W-Cu Alloy Performances -- Design on Numerical Control System of Glass Cutting Machine Based on PC -- Fast Frequency Hopping Signal Generator Based on DDS -- The Optimization of Material Thickness for Neutron Shielding with Monte Carlo Method -- A Method to Measure Rotary Speed and Torque Using JC Sensors -- Different Evaluation Approaches of Confusion Network in Chinese Spoken Classification -- Study on Mine-Used Battery Locomotive Charging System -- Steel Wire Rope Section Damage Detection System Based on Wavelet Multi-Resolution Analysis -- Three-Level SVPWM Controller Design Based on FPGA -- Phase Error Immunity Optical Measurement System -- A Stable Least Squares Ellipses Fitting Algorithm Based on Zernike Moments -- Accuracy Verification Method about Optical Three-Dimensional Measuring Instrument -- Contrast Research on Cutting Forces in 4-Axis and 5-Axis Blade Machining Process -- A Method to Center Extraction of Reference Point Algorithm in Reverse Engineering -- Optimal Design of Flexible Manufacturing System Based on Optical Measurement Principle -- Material Removal for Modal Effect on Impeller Blades by Finite Element Analysis -- Rotation Inertia Measurement Device Design of Winged Rigid Body Based on TRIZ Conflict Resolving Matrix -- Development of NC System of the 3-PUU Parallel Machine Tool Based on PMAC -- Finite Element Analysis and Dynamic Testing for Hard Gear Cutting by Gear Hobbing Machine -- Design and Stimulation of Hydraulic Servo System for Vehicle Test Equipment for Rubber Shock Absorber -- Research on Chip Breaking Mechanism of High-Temperature and High-Strength Steel 2.25Cr-1Mo-0.25V -- Research on the Machinability of Hydrogenated Cylindrical Shell Materials (2.25 Cr-1Mo-0.25V Steel) -- Applied Research of the Electric Spindle Technology on Sub-Nanometer Crusher with Cellulosine -- High-Speed Milling Toolpath Planning for Aviation Engines Impeller Using POWERMILL Software -- Finite Element Analysis of Cold Extrusion Combination Mold Interference Fit -- Coagulant Prepared by Gangue and its Application in Treatment of Coal Washing Wastewater -- Development and Oxidation of RexOy-Modified Aluminide Coating -- Design and Research on Two-Degree of Freedom Spherical Gear -- An Algorithm for Computation of Radial-Harmonic-Fourier Moments -- Applied Research on Synesthesia Theory in Industrial Design.…”
    Full text (MFA users only)
    Electronic eBook
  15. 495

    Advances in portfolio construction and implementation

    Published 2003
    Full text (MFA users only)
    Electronic eBook
  16. 496

    A Primer on Machine Learning Applications in Civil Engineering by Deka, Paresh Chandra

    Published 2019
    Table of Contents: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Acknowledgments -- A Primer on Machine Learning Applications in Civil Engineering -- Author -- 1: Introduction -- 1.1 Machine Learning -- 1.2 Learning from Data -- 1.3 Research in Machine Learning: Recent Progress -- 1.4 Artificial Neural Networks -- 1.5 Fuzzy Logic (FL) -- 1.6 Genetic Algorithms -- 1.7 Support Vector Machine (SVM) -- 1.8 Hybrid Approach (HA) -- Bibliography -- 2: Artificial Neural Networks -- 2.1 Introduction to Fundamental Concepts and Terminologies -- 2.2 Evolution of Neural Networks -- 2.3 Models of ANN -- 2.4 McCulloch-Pitts Model -- 2.5 Hebb Network -- 2.6 Summary -- 2.7 Supervised Learning Network -- 2.7.1 Perceptron Network -- 2.7.2 Adaptive Linear Neuron -- 2.7.3 Back-Propagation Network -- 2.7.4 Radial Basis Function Network -- 2.7.5 Generalized Regression Neural Networks -- 2.7.6 Summary -- 2.8 Unsupervised Learning Networks -- 2.8.1 Introduction -- 2.8.2 Kohonen Self-Organizing Feature Maps -- 2.8.3 Counter Propagation Network -- 2.8.4 Adaptive Resonance Theory Network -- 2.8.5 Summary -- 2.9 Special Networks -- 2.9.1 Introduction -- 2.9.2 Gaussian Machine -- 2.9.3 Cauchy Machine -- 2.9.4 Probabilistic Neural Network -- 2.9.5 Cascade Correlation Neural Network -- 2.9.6 Cognitive Network -- 2.9.7 Cellular Neural Network -- 2.9.8 Optical Neural Network -- 2.9.9 Summary -- 2.10 Working Principle of ANN -- 2.10.1 Introduction -- 2.10.2 Types of Activation Function -- 2.10.3 ANN Architecture -- 2.10.4 Learning Process -- 2.10.5 Feed-Forward Back Propagation -- 2.10.6 Strengths of ANN -- 2.10.7 Weaknesses of ANN -- 2.10.8 Working of the Network -- 2.10.9 Summary -- Bibliography -- 3: Fuzzy Logic -- 3.1 Introduction to Classical Sets and Fuzzy Sets -- 3.1.1 Classical Sets -- 3.1.2 Fuzzy Sets -- 3.1.3 Summary.…”
    Full text (MFA users only)
    Electronic eBook
  17. 497

    Practical Strategies in Geriatric Mental Health : Cases and Approaches. by Dunn, Laura B.

    Published 2019
    Full text (MFA users only)
    Electronic eBook
  18. 498
  19. 499

    Handbook for pandemic and mass-casualty planning and response

    Published 2012
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  20. 500

    Debates in the digital humanities 2016

    Published 2016
    Table of Contents: “…Father Busa Female Punch Card Operatives / Melissa Terras and Julianne Nyhan -- On the Origin of "Hack" and "Yack" / Bethany Nowviskie -- Reflections on a Movement: #transformDH, Growing Up / Moya Bailey, Anne Cong-Huyen, Alexis Lothian, and Amanda Phillips.…”
    Full text (MFA users only)
    Electronic eBook